Looking at syscalls, I see Zoom desktop reads all processes and arguments. [pid 3844872] stat("/proc/1", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/1/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/1/cmdline", O_RDONLY) = 4 [pid 3844872] readlink("/proc/1/exe", 0x20c0520, 1024) = -1 EACCES (Permission denied) [pid 3844872] stat("/proc/2", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/2/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/2/cmdline", O_RDONLY) = 4 [pid 3844872] stat("/proc/3", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/3/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/3/cmdline", O_RDONLY) = 4 ... Why would it do that? Is there any way to prevent it? Comments URL: https://news.ycomb...